{"title":"Design and application of the Hardware-in-the-Loop Simulation System for distillation columns","authors":"T. Zang, Aidong Wang","doi":"10.1109/IASP.2009.5054617","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054617","url":null,"abstract":"This paper proposes a method for taking Laboratory scale distillation columns as objects and Matlab as the main development tool to constitute the Hardware-in-the-Loop Simulation System for distillation columns. The system achieves real-time data fetch and system data management by using the API interface and Database Toolbox of Matlab; the system simulation platform designed by taking advantage of the Matlab Graphics User Interface (GUI) environment is interactive and scalable. It has been proven as the way to establish a hardware-in-the-loop (HIL) simulation laboratory platform for a control system based on available process laboratory equipment and can be applied universally.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125877448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the meso-structure image of shale based on the digital image processing technique","authors":"C. Yuchao, Liu Hui","doi":"10.1109/IASP.2009.5054656","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054656","url":null,"abstract":"The digital image processing techniques, including gray level transformation, image sharpening, image segmentation and edge detection, is applied to the study on the meso-structure image of shale. The results show that the digital image processing technique can extract useful information from the CT images and construct a model of meso-structure of shale. The model shows the spatial distribution of the different media in the rock. The process of the damage propagation can be seen IN the meso-structure image clearly. Meanwhile, a process, including geometrical vectorization, scaling transformation, and the realization of the FEM software interface, is provided to establish a finite element grid model. The proposed approach can be a research foundation for the further study on the physical and mechanical properties of rock.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126657337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image encryption algorithm based on Henon chaotic system","authors":"Chen Wei-bin, Zhang Xin","doi":"10.1109/IASP.2009.5054653","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054653","url":null,"abstract":"In this paper, a new image encryption algorithm is presented based on Henon chaotic system in order to meet the requirements of secure image transfer. Shuffling the positions and changing the grey values of image pixels are combined to shuffle the relationship between the cipher-image and the original-image. First, the Arnold cat map is used to shuffle the positions of the image pixels. Second, the shuffled-image is encrypted based on Henon's chaotic system pixel by pixel. There are several parameters in this kind of chaos system and Arnold cat map. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for image encryption. The distribution of grey values of the encrypted image exhibits a random-like behavior.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116455396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Han Xiuli, Wu Lifang, Liu Xingsheng, C. Zhaohui, Gong Yu
{"title":"Offense-defense semantic analysis of basketball game based on motion vector","authors":"Han Xiuli, Wu Lifang, Liu Xingsheng, C. Zhaohui, Gong Yu","doi":"10.1109/IASP.2009.5054655","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054655","url":null,"abstract":"Motions of a camera can reflect certain kinds of semantic information in video sequences; therefore, in this paper, according to the distant court shot in basketball game, we calculate the motion vector first, then analyze the semantic information of the motion vector, and finally annotate the offense-defense actions in games. Experiments are showing the possibility that the proposed technique can annotate the offense-defense semantic actions as expected.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121388612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on virtual simulation of chip during manufacturing","authors":"Xun Liu, Lixia Yang","doi":"10.1109/IASP.2009.5054595","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054595","url":null,"abstract":"The problem of chip control is an important issue faced by many advanced manufacturing method during processing, which affects production efficiency significantly. This paper analyzes and studies the mechanism of chip generation, curling, and breaking and sets up its mathematic model. Using VC++ to write the solution program, a set of relevant mathematic models of chip generation and breaking have been reflected into the resources of OpenGL and WTK. Finally the VR of chip generating and breaking had been completed.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124033115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of balloon snake model in the extraction of parasite image contour","authors":"Zhao Xiaoming","doi":"10.1109/IASP.2009.5054668","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054668","url":null,"abstract":"Image contour extraction plays an important role in medical image analysis, and the Parametric Active Contour Model-Snake model is a commonly used method of image contour extraction. First, this paper first explains the basic principles of the snake model and its discrete implementation method. Second, we detail some of the shortcomings of the traditional snake model using examples and explains how the improved balloon snake model can make up for these shortcomings. Comparison of the experimental results shows that the balloon snake model is highly effective for image contour extraction. Finally, we apply the balloon snake model on the extraction of microscopic images of parasites.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127763034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The simulation of parametric fountain based on Direct3D","authors":"Liang Yan-yan, Wang Wei-hong, Gu Guo-min","doi":"10.1109/IASP.2009.5054601","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054601","url":null,"abstract":"According to the features of Direct3D graphics library and particle system, common parameters of particle system are abstracted. On the basis of them, more realistic rendering of the fountain is realized with usage of textures. Different from other algorithms, we present an algorithm in which the user can alter the fountain in real time by adjusting some parameters such as the velocity, the direction, the size etc. Furthermore, this method simulates the effects of the particles dropped into water and can be encapsulated to a module and integrated into 3D simulation platform.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security design for Instant Messaging system based on RSA and triple DES","authors":"Wenping Guo, Zhenlong Li, Ying Chen, Xiaoming Zhao","doi":"10.1109/IASP.2009.5054659","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054659","url":null,"abstract":"The technology of Instant Messaging (IM) is becoming an important means of communication nowadays. However, some inherit security weaknesses have been recognized as a serious barrier for IM building up its position as an Internet key application. This paper presents a security design for IM on the basis of comparison between the RSA algorithm and the 3DES algorithm that satisfy the requirements at both the security level and computational speed.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133072536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new spectral image assessment based on energy of structural distortion","authors":"C. Wang, Xuebin Liu, Bing-liang Hu","doi":"10.1109/IASP.2009.5054606","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054606","url":null,"abstract":"We proposed a new method for assessing spectral image quality. It is based on the energy of structural distortion. We compared it with other assessments which have been used to evaluate spectral image before. Numerical results show that the proposed approach runs well.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"12 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research in codec optimization and the application of SP-frame in H.264/AVC","authors":"Yifeng Liu, C. Xiao, Ligang Zhen","doi":"10.1109/IASP.2009.5054645","DOIUrl":"https://doi.org/10.1109/IASP.2009.5054645","url":null,"abstract":"The new SP-frame, which can replace Intra-frame, is used for bitstream switching. In this paper, first, the SP-frame's main applications are introduced; second, by analyzing the original SP-frame coding process, the new scheme is proposed, which allows drift-free bitstream switching; finally, a lot of simulation results are used to compare SP-frame coding efficiency with other frames. The experimental results indicate, SP-frame coding efficiency is near P-frame's, but much higher than Intra-frame's. Compared with the P-frame, the SP-frame can afford such a function; at the same time, the SP-frame can reduce bit rate compared with Intra-frame.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132096055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}